CVE-2019-13132 — Out-of-bounds Write in Libzmq
Severity
9.8CRITICALNVD
EPSS
27.9%
top 3.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 10
Latest updateJun 15
Description
In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
Also affects: Debian Linux 8.0, 9.0, Fedora 29, 30, 31, Ubuntu Linux 16.04, 18.04, 18.10, 19.04
🔴Vulnerability Details
3📋Vendor Advisories
4🕵️Threat Intelligence
1💬Community
5Bugzilla▶
CVE-2019-13132 zeromq: stack-overflow on any server protected by encryption/authentication [fedora-all]↗2019-07-15
Bugzilla▶
CVE-2019-13132 zeromq: stack-overflow on any server protected by encryption/authentication [epel-all]↗2019-07-15
Bugzilla▶
CVE-2019-13132 zeromq: stack-overflow on any server protected by encryption/authentication [openstack-rdo]↗2019-07-15
Bugzilla▶
CVE-2019-13132 zeromq: stack-overflow on any server protected by encryption/authentication↗2019-07-04